The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The attribute based signature scheme could verify the signature by the attribute instead of public key. But, a large number of bilinear operations are concentrated in the verification process, so the amount of computation required for signature verification is much larger than that of signature generation. To solve this problem, this paper proposed an attribute based signature scheme with aided-verification,...
In order to realize data sharing in mobile cloud computing, decentralized attribute-based encryption (ABE) has been widely concerned. However, the existing ABE schemes are full of flaws. First, the main drawback of ABE is that the computation cost of encryption and decryption are expensive. Second, the existing ABE schemes are inapplicable due to the inefficiency of user revocation. Besides, in a...
Serving as the global Internet's phonebook, the Domain Name Service (DNS) helps to translate human-friendly domain names into machine-readable IP addresses, which makes DNS of great importance to the operation of the Internet and virtually relied on by today's almost all kinds of Internet-based activities. As such, people whoever want to go anywhere over the Internet will need to refer to the DNS...
Recently, with the maturity of cloud services and the development of distributed computing, increasing images and video data are stored in the cloud. However, cloud services are generally provided by the third party entities. In addition, the images and video which are stored in the cloud mostly depend on the security of the cloud servers, while the data are not encrypted, which is a great threat...
The cloud computing technology offers many important features in electronic health record (EHR) system. But the patient has no control over their health record, once the data are stored in the cloud server. So ensuring the possession of correct EHR data is essential. The issue has become a challenge as the possession of data need to be verified while maintaining the privacy of EHR against the auditor...
Popular service providers, such as Google and Amazon, have turned their vast resources into a cloud computing model and enforced their businesses to run applications on the servers of such new model. To ensure security and privacy in this environments, customers have to encrypt their data before uploading them into the cloud servers. Unfortunately, modern unbreakable encryption methods are inadequate...
Many cloud platforms emerge to meet urgent requirements for large-volume personal image store, sharing and search. Though most would agree that images contain rich sensitive information (e.g., People, location and event) and people's privacy concerns hinder their participation into untrusted services, today's cloud platforms provide little support for image privacy protection. Facing large-scale images...
Network systems are becoming the core components of technical information infrastructures. The protection of network systems from malicious attacks is an urgent priority in our society. However, considering that all security threats are very complicated, easily missed, and error-prone, dealing with network vulnerabilities has brought about enormous challenges to network management. Therefore, one...
Cloud providers provide various promising services to users and this makes the cloud to be very popular among users. Cloud computing is a location independent computing wherein files are outsourced as a service. Users outsource their data to the third party cloud server to reduce various costs such as storage, management etc. The outsourced data may have sensitive and valuable information that needs...
The proliferation of mobile devices has facilitated the prevalence of participatory sensing applications in which participants collect and share information in their environments. The design of a participatory sensing application confronts two challenges: “privacy” and “incentive” which are two conflicting objectives and deserve deeper attention. Inspired by physical currency circulation system, this...
Location-based services (LBSs) are attracting more and more attentions with the increasing popularity of mobile devices and online social networking. In LBSs, users can conveniently obtain their interested information by sending queries to the LBS server. However, users' queries include their identities, locations, interests, etc, which may result in the leakage of users' trajectory and other sensitive...
The trend of location surveillance system is increasing day-by-day, so the range of such services providing systems like GPS and PDA's conjointly increase parallel. As a result of this, we tend to get the precise and applicable location of monitoring object. However at an equivalent time the foremost necessary issue of privacy is missing. WSN chiefly consists of spatially distributed autonomous sensors...
Cloud computing becomes increasingly popular. To protect data privacy, sensitive data should be encrypted by the data owner before outsourcing, which makes the traditional and efficient plaintext keyword search technique useless. The existing searchable encryption schemes support only exact or fuzzy keyword search, not support semantics-based multi-keyword ranked search. In the real search scenario,...
In this modern-day society, people get information by using a search engine, and this is a very ordinary part of our lives. When users, however, begin to retrieve some information after their login on the portal sites, the data related to the user and the query information may be sent to the portal server to enhance the users' comfort. Here, the information that the user does not want to expose can...
Very often, network users expect to access services relevant to their locations, whilst preserve their privacy without disclose their exact locations. The well-known privacy preserving method is the spatial cloaking technique where exact user locations are blurred into a cloaked region to meet the privacy requirement, e.g. k-anonymity. Most of current solutions are designed with a centralized architecture...
Predicate encryption is a novel cryptographic primitive that provides fine-grained control over the accesses to encrypted data. It is often used in secure cloud storage and biometric matching. In this manuscript, we first propose a variant of symmetric predicate encryption, which provides controllable privacy preserving search functionalities, including revocable delegated search and un-decryptable...
Automated Trust Negotiation (ATN) is an approach to allow two participants to automatically verify whether their policies are consistent with each other or not. During the negotiation process, in order to protect privacy, both participants intend to disclose their credentials and policies as little as possible. A previous work(ATN)[14] successfully negotiates with perfect privacy preservation where...
Privacy preserving in location-based service (LBS) has been an important issue in Vehicular Ad hoc Network (VANET). Traditional k-anonymity algorithm dealing with location privacy protecting problem does not consider vehicle's mobility and inner collaborator. In this paper, we propose a new algorithm which uses dynamic and mobile aware anonymous peer selecting algorithm to improve the anonymity and...
Cloud computing becomes a hot research topic in the recent years. In the cloud computing, software applications and databases are moved to the centralized large data centers, which is called cloud. In the cloud, due to lack of physical possession of the data and the machine, the data and computation may not be well managed and fully trusted by cloud users. Existing work on cloud security mainly focuses...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.